Filters








355 Hits in 6.2 sec

Cryptanalysis of Timestamp-Based Password Authentication Schemes Using Smart Cards [chapter]

Guilin Wang, Feng Bao
2006 Lecture Notes in Computer Science  
In 1999, Yang and Shieh [14] proposed two password authentication schemes using smart cards.  ...  Password authentication is an important mechanism for remote login systems, where only authorized users can be authenticated via using their passwords and/or some similar secrets.  ...  In 1999, Yang and Shieh [14] proposed two password authentication schemes using smart cards, one is timestamp-based and the other is nonce-based.  ... 
doi:10.1007/11935308_28 fatcat:5rkwzargo5ednhs2og2mcaqjqq

A Review and Cryptanalysis of Similar Timestamp-Based Password Authentication Schemes Using Smart Cards

Al-Sakib Khan Pathan
2010 International Journal of Communication Networks and Information Security  
The intent of this paper is to review some timestampbased password authentication schemes using smart cards which have similar working principles.  ...  login procedure using smart cards.  ...  A detailed literature review of the timestamp-based password authentication schemes using smart cards. 2. Cryptanalysis and pointing out the inefficiencies of Wang-Li's [1] improved scheme. 3.  ... 
dblp:journals/ijcnis/Pathan10 fatcat:pctoyhescneaji5inicoeexdbi

Cryptanalysis of Sun and Cao's Remote Authentication Scheme with User Anonymity [article]

Dheerendra Mishra
2014 arXiv   pre-print
In 2013, Khan et al. proposed an improved dynamic ID-based authentication scheme to overcome the security flaws of Wang et al.'s authentication scheme.  ...  Dynamic ID-based remote user authentication schemes ensure efficient and anonymous mutual authentication between entities.  ...  Security Weaknesses of Sun and Cao's Scheme Off-line password guessing attack The password guessing attack is the one of the most common attack on password based authentication protocols using smart  ... 
arXiv:1310.6422v2 fatcat:gsx2k3iwyfd57e5mgtxndcgawe

Cryptanalysis of Improved Biometric-Based User Authentication Scheme for C/S System

Younsung Choi, Donghoon Lee, Jiye Kim, Jaewook Jung, Dongho Won
2015 International Journal of Information and Education Technology  
s scheme is vulnerable against server masquerading attack and stolen smart card attack. And also we show the possibility of authentication without login phase in Jiping et al.'  ...  s authentication scheme. Index Terms-User authentication, biometric-base scheme, client/server system, cryptanalysis on authentication scheme.  ...  S SCHEME Cryptanalysis of Improved Biometric-Based User Authentication Scheme for C/S System Das proposed a biometric-based authentication scheme that has various security problems.  ... 
doi:10.7763/ijiet.2015.v5.564 fatcat:yiafpmjmevfp5dvpdvr3popm2m

Cryptanalysis of Two Improved Password Authentication Schemes Using Smart Cards

Ren-Chiun Wang, Chou Chen Yang
2006 International Journal of Network Security  
Recently, Yang et al. improved Yang and Shieh's two password authentication schemes to withstand Sun and Yeh's forgery attacks. However, Kim et al. pointed out that Yang et al.'  ...  Introduction In a client/server system, a password authentication scheme with smart card is widely used to identify the valid of a remote user [2, 5, 6] .  ...  Nonce-based Password Authentication Scheme Registration phase: This phase is same as the registration phase in the timestamp-based password authentication scheme.  ... 
dblp:journals/ijnsec/WangY06 fatcat:nwdzs2vkx5ezvbwcthly4pdfui

Cryptanalysis of Yang-Wang-Chang's Password Authentication Scheme with Smart Cards [article]

Al-Sakib Khan Pathan, Choong Seon Hong
2008 arXiv   pre-print
using smart cards.  ...  In 2005, Yang, Wang, and Chang proposed an improved timestamp-based password authentication scheme in an attempt to overcome the flaws of Yang-Shieh_s legendary timestamp-based remote authentication scheme  ...  In 1999, Yang and Shieh [1] proposed two authentication schemes using smart cards, one of which was the time-stamp based password authentication scheme.  ... 
arXiv:0804.1185v1 fatcat:gzg7o2wmpndxjgwza33a73qdfy

Cryptanalysis and Enhancement of a Remote User Authentication Scheme Using Smart Cards
스마트카드를 이용한 사용자 인증 스킴의 안전성 분석 및 개선

Young-Sook Lee, Dong-Ho Won
2010 Journal of the Korea Society of Computer and Information  
In 2005, Liao et al. proposed a remote user authentication scheme using a smart card, in which users can be authenticated anonymously.  ...  Our analysis shows that Yoon et al.' s scheme does not guarantee not only any kind of authentication, either server-to-user authentication or user-to-server authentication but also password security.  ...  In a typical password-based authentication scheme using smart cards, remote users are authenticated using their smart card as an identification token; the smart card takes as input a password from a user  ... 
doi:10.9708/jksci.2010.15.1.139 fatcat:doavuh4z3jhqbcwmfwtpgjqduy

Cryptanalysis of Song's advanced smart card based password authentication protocol [article]

Juan E. Tapiador, Julio C. Hernandez-Castro, P. Peris-Lopez, John A. Clark
2011 arXiv   pre-print
Song Song10 proposed very recently a password-based authentication and key establishment protocol using smart cards which attempts to solve some weaknesses found in a previous scheme suggested by Xu, Zhu  ...  Similar protocols based on smart cards gained some popularity shortly after that. In such schemes, the user is provided with a card and a password as identification tokens.  ...  Introduction Remote user authentication is a central problem in network security. In a seminal paper, Lamport [5] proposed in 1981 a password-based scheme using hash chains.  ... 
arXiv:1111.2744v1 fatcat:xoogfn66bbd73blz2rtnxd4vsm

Cryptanalysis of a flexible remote user authentication scheme using smart cards

Wei-Chi Ku, Shuai-Min Chen
2005 ACM SIGOPS Operating Systems Review  
In 2002, Lee, Hwang, and Yang proposed a verifier-free remote user authentication scheme using smart cards. Their scheme is efficient because of mainly using cryptographic hash functions.  ...  In this paper, we first show the weaknesses of Lee-Hwang-Yang's scheme, and then compare Lee-Hwang-Yang's scheme with three similar schemes.  ...  In 1999, Yang and Shieh [22] proposed two verifier-free password authentication schemes using smart cards, one uses timestamps and the other uses nonces.  ... 
doi:10.1145/1044552.1044562 fatcat:5w272e3jjbcmzam6yxb7enfyoe

Cryptanalysis of Password Authentication Scheme Using Smart Cards

Sattar J Aboud, Abid T. Al Ajeeli
2012 Journal of Internet Technology and Secured Transaction  
In this paper, we review two password schemes that use a smart card. The schemes verify the logon password without a password file.  ...  Both schemes are based on the idea of integer factoring and discrete logarithm problem.  ...  Small exponent e can reduce the computing cost of smart cards used in the Shen et al. scheme as the authentication devices for users.  ... 
doi:10.20533/jitst.2046.3723.2012.0004 fatcat:32fwickkx5arxpcgltadexgzf4

Cryptanalysis and Improvement of a Two-Factor User Authentication Scheme Providing Mutual Authentication and Key Agreement over Insecure Channels

Sajida Kalsoom, Sheikh Ziauddin
2013 International Journal of Machine Learning and Computing  
A two-factor remote authentication scheme was presented by Chun-Ta Li et al. in 2010. We present the framework of an impersonation attack against their scheme if the smart card gets stolen.  ...  We show that it is easy for an attacker to compute password of a user by using information extracted from the stolen smart card. We also propose a simple and easy solution to fix this problem.  ...  SCHEME Table I shows all notations we used in our paper. Chun-Ta Li et al. [1] use password and smart card to authenticate users.  ... 
doi:10.7763/ijmlc.2013.v3.348 fatcat:jqym2pdxhfcc7jyynrar5f3khu

Cryptanalysis of a New Dynamic ID-based User Authentication Scheme to Resist Smart-Card-Theft Attack

Fengtong Wen, Dianli Guo, Xuelei Li
2014 Applied Mathematics & Information Sciences  
In a recent paper (AMIS, 6(2S), 2012), Lee proposed a dynamic ID-based user authentication scheme based on smart card which is believed to have many abilities to resist a range of network attacks.  ...  the smart card.  ...  This work is supported by Natural Science Foundation of Shandong Province (NO. ZR2013FM009).  ... 
doi:10.12785/amis/080443 fatcat:admamdc6orfv3ndc6ukluu47ka

Cryptanalysis of a remote user authentication scheme using smart cards

Chi-Kwong Chan, L.M. Cheng
2000 IEEE transactions on consumer electronics  
In this paper, we present a cryptanalysis of a remote user authentication scheme proposed by Hwang and Li. We show that Hwang-Li's scheme is breakable.  ...  A legitimate user can impersonate other legal users and pass the system authentication. Kegwords- Cryptography; cryptanalysis; password authentication; remote login.  ...  I N T R O D I J~T I O~ A remote user authentication scheme using smart cards has been recently proposed by Hwang and Li [l] . Hwang-Li's scheme is based on the ElGamal's publickey scheme [2].  ... 
doi:10.1109/30.920451 fatcat:kgc55ogojfhilltgyoo5vtwioi

Security Weaknesses of a Timestamp-Based User Authentication Scheme with Smart Card

Jaewook Jung, Younsung Choi, Donghoon Lee, Jiye Kim, Dongho Won
2015 International Journal of Information and Education Technology  
In recent years, several remote user authentication schemes using smart card have been proposed. Recently, Huang et al. proposed a timestamp-based user authentication scheme with smart card.  ...  In this paper, we conduct detailed analysis of flaws in Huang et al.'s scheme. Index Terms-Remote user authentication scheme, smart card, password, security.  ...  timestamp-based user authentication scheme with smart card.  ... 
doi:10.7763/ijiet.2015.v5.567 fatcat:rtgaadyixveola4d574j6zxjbi

Cryptanalysis of An Advanced Temporal Credential-Based Security Scheme with Mutual Authentication and Key Agreement for Wireless Sensor Networks [article]

Chandra Sekhar Vorugunti, Mrudula Sarvabhatla
2013 arXiv   pre-print
Unfortunately, in this paper we will show that their scheme is vulnerable to offline password guessing attack, stolen smart card attack, leakage of password etc. and failure to provide data privacy.  ...  In 2013, Li et al. proposed a temporal-credential-based mutual authentication and key agreement scheme for WSNs.  ...  [2] have cryptanalyzed the authentication schemes based on the above assumption. (Assumption that a smart card even though it is a tamper resistant, the data stored in its memory can be read out.)  ... 
arXiv:1311.3099v1 fatcat:f5d5yxouhrbbhnlhcyp4x5zjma
« Previous Showing results 1 — 15 out of 355 results